From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Synthesis and Ranking of Secure BPMN Orchestrators., , , , , и . Int. J. Secur. Softw. Eng., 5 (2): 44-64 (2014)Towards safer information sharing in the cloud., , , и . Int. J. Inf. Sec., 14 (4): 319-334 (2015)Risk analysis of Android applications: A user-centric solution., , , , , и . Future Gener. Comput. Syst., (2018)Full-protocol safety analysis of CINNAMON., , и . VTC Spring, стр. 1-7. IEEE, (2022)Towards the COSCA framework for "COnseptualing Secure CArs"., , , , и . Open Identity Summit, том P-312 из LNI, стр. 37-46. Gesellschaft für Informatik e.V., (2021)Towards Information Flow Properties for Distributed Systems., , и . VODCA@FOSAD, том 236 из Electronic Notes in Theoretical Computer Science, стр. 65-84. Elsevier, (2008)EARNEST: A challenge-based intrusion prevention system for CAN messages., , и . ISSRE Workshops, стр. 243-248. IEEE, (2020)Enforcing Mobile Application Security Through Probabilistic Contracts., , , и . ESSoS Doctoral Symposium, том 1298 из CEUR Workshop Proceedings, CEUR-WS.org, (2014)Presente Digitale: An Online Education System for Teachers., , , , и . HELMeTO, том 1344 из Communications in Computer and Information Science, стр. 271-285. Springer, (2020)Extending Security-by-Contract with Quantitative Trust on Mobile Devices., , , , , и . CISIS, стр. 872-877. IEEE Computer Society, (2010)